nuclei-templates/http/technologies/microsoft/microsoft-sharepoint-detect...

27 lines
536 B
YAML
Raw Normal View History

id: microsoft-sharepoint-detect
info:
name: Microsoft SharePoint Detect
author: p-l-
severity: info
description: Check for SharePoint, using HTTP header MicrosoftSharePointTeamServices
tags: sharepoint,iis,microsoft,tech
metadata:
max-request: 1
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: regex
part: header
regex:
- "(?i)(Microsoftsharepointteamservices:)"
extractors:
- type: kval
kval:
- MicrosoftSharePointTeamServices